Fake Cloudflare CAPTCHA page laden with malware uncovered in the wild - here's how to stay secure and safe
ClickFix launches with keyboard shortcuts and is scarily effective

- ClickFix uses fake CAPTCHA screens to trick users into launching malware via simple keyboard commands
- The phishing page mimics Cloudflare perfectly, right down to Ray IDs and security padlocks
- Clicking “Verify you are human” starts a process that silently infects your machine with malware
A sophisticated yet deceptively simple phishing technique is currently circulating, using fake Cloudflare CAPTCHA pages to infect users with malware.
New research from SlashNext claims the technique, known as ClickFix, preys on familiar internet behavior, tricking users into executing commands that install malicious software.
ClickFix works by presenting a counterfeit version of Cloudflare’s Turnstile CAPTCHA page. Everything from the visual layout to technical elements like the Ray ID identifier is convincingly replicated.
Hinges on a prompt that users will ordinarily not scrutinize
The phishing site may be hosted on a domain that closely resembles a legitimate one, or on a real website that has been compromised.
When users land on the page, they are prompted to tick a box labelled “Verify you are human.” This step appears routine and raises no suspicion - but what follows is the core of the scam: users are guided through a set of instructions - pressing Win+R, then Ctrl+V, and finally Enter.
These steps seem harmless, but they execute a PowerShell command that has already been silently copied into the user’s clipboard.
Once executed, the command can retrieve malware such as Stealc, Lumma, or even remote access trojans like NetSupport Manager.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
"ClickFix is a social engineering attack that tricks users into running malicious commands on their own devices – all under the guise of a routine security check,” said security researcher Daniel Kelley.
What makes ClickFix especially insidious is how it turns standard security expectations into weapons. The padlock icon, familiar CAPTCHA format, and a legitimate-looking URL all serve to lull users into compliance.
This exploits what researchers refer to as “verification fatigue”, a user’s tendency to click through security prompts without proper scrutiny.
The trick doesn’t rely on exploiting software vulnerabilities, but rather on abusing trust and habitual behavior.
The phishing page is delivered as a single HTML file, but contains embedded scripts and obfuscated code designed to perform clipboard injections.
Because it leverages legitimate Windows utilities and doesn’t download executables, it can evade many traditional detection tools.
Standard defenses, like antivirus software or endpoint protection, are typically geared toward catching suspicious downloads or binaries. But in this case, users are tricked into launching the threat themselves.
This highlights the need for advanced malware protection with zero-hour defense, capable of detecting clipboard injections and fake CAPTCHA screens in real time.
You might also like
- Downloaded something dodgy? These are the best malware removal tools
- Nail the basics with the best firewalls available now
- OpenAI says it disrupted at least 10 malicious AI campaigns already this year

Efosa has been writing about technology for over 7 years, initially driven by curiosity but now fueled by a strong passion for the field. He holds both a Master's and a PhD in sciences, which provided him with a solid foundation in analytical thinking. Efosa developed a keen interest in technology policy, specifically exploring the intersection of privacy, security, and politics. His research delves into how technological advancements influence regulatory frameworks and societal norms, particularly concerning data protection and cybersecurity. Upon joining TechRadar Pro, in addition to privacy and technology policy, he is also focused on B2B security products. Efosa can be contacted at this email: udinmwenefosa@gmail.com
You must confirm your public display name before commenting
Please logout and then login again, you will then be prompted to enter your display name.